Starweaver
Cybersecurity Governance: 16 Steps with NIST & ISO
Starweaver

Cybersecurity Governance: 16 Steps with NIST & ISO

Paweł Mielniczek
Starweaver

位教师:Paweł Mielniczek

包含在 Coursera Plus

深入了解一个主题并学习基础知识。
中级 等级

推荐体验

8 小时 完成
灵活的计划
自行安排学习进度
深入了解一个主题并学习基础知识。
中级 等级

推荐体验

8 小时 完成
灵活的计划
自行安排学习进度

您将学到什么

  • Analyze your organization’s risk landscape to scope and map controls, governance gaps and priorities.  

  • Implement automated workflows using a 16-step blueprint to integrate cloud security and privacy safeguards.  

  • Evaluate control effectiveness by applying incident response and continual improvement.  

  • Create a fully audit-ready cybersecurity governance program. 

要了解的详细信息

可分享的证书

添加到您的领英档案

最近已更新!

September 2025

授课语言:英语(English)

了解顶级公司的员工如何掌握热门技能

Petrobras, TATA, Danone, Capgemini, P&G 和 L'Oreal 的徽标

该课程共有6个模块

In this course, you’ll learn how to integrate ISO 27001/27002/27701 with the NIST Cybersecurity Framework through a structured, 16-step blueprint. You’ll focus on translating global standards into actionable governance practices, from scoping and risk assessment to control mapping, cloud and privacy safeguards, and continuous improvement. Through concise expert-led videos, hands-on templates, and workflow demonstrations, you’ll gain the skills to design and operate a repeatable, audit-ready governance program. By the end, you’ll be equipped to unify fragmented processes, strengthen risk-driven decision-making, and deploy a resilient framework that adapts to evolving threats and regulatory demands.

涵盖的内容

1个视频1篇阅读材料1个插件

In this module, you’ll explore how to establish the foundation for a resilient cybersecurity governance program. You’ll examine how to define the purpose, scope, and context of an Information Security Management System (ISMS) aligned with ISO 27001 and the NIST Cybersecurity Framework. You’ll learn how to engage leadership, align stakeholders, and set clear roles and responsibilities through governance tools and RACI matrices. Finally, you’ll apply strategies for developing success criteria, mapping strategic goals, and scoping processes to ensure accurate, audit-ready implementation.

涵盖的内容

10个视频1篇阅读材料1个作业1次同伴评审1个讨论话题

In this module, you’ll explore how to conduct risk-driven governance by applying structured frameworks for assessment and control alignment. You’ll examine ISO 27005 and NIST SP 800-30 methods to identify, analyze, and prioritize risks, while setting acceptance thresholds that reflect business goals and compliance drivers. You’ll also learn to tailor ISO Annex A and NIST CSF controls to organizational risk profiles, justify selections for audit readiness, and integrate cloud and privacy safeguards from ISO 27017, ISO 27701, and the NIST Privacy Framework. Finally, you’ll apply documentation strategies and practical tools to deliver audit-ready risk registers, control mappings, and privacy addenda that strengthen governance and resilience.

涵盖的内容

10个视频1篇阅读材料1个作业1次同伴评审1个讨论话题

In this module, you’ll explore how to operationalize cybersecurity governance through continuity planning, technical safeguards, and workforce awareness programs. You’ll examine ISO 22301 and NIST CSF recovery practices to build resilience against disruptions, while applying ISO 27017 and NIST SP 800-53 to deploy cloud and technical controls. You’ll also design staff training initiatives that foster a security-aware culture and implement ISO 30111 and NIST SP 800-40 methods for vulnerability and patch management. By the end, you’ll have the tools to enforce governance effectively, minimize downtime, and ensure ongoing compliance.

涵盖的内容

10个视频1篇阅读材料1个作业1次同伴评审1个讨论话题

In this module, you’ll explore how to strengthen governance through proactive monitoring, incident response, and continuous optimization. You’ll examine ISO 27035 and NIST SP 800-61 playbooks to design incident-response plans, define roles, and conduct readiness drills. You’ll establish measurable KPIs and tier-based metrics with ISO 27004 and NIST frameworks to ensure audit readiness and build compliance dashboards. Finally, you’ll apply automation and AI-driven workflows to streamline monitoring, reuse templates, and embed feedback loops that drive ongoing improvement and scalability of your ISMS.

涵盖的内容

10个视频1篇阅读材料1个作业1次同伴评审1个讨论话题

In this wrap-up module, you’ll consolidate your learning by applying governance planning, risk assessment, implementation, and monitoring skills in a multi-layered breach simulation. By the end, you’ll showcase the skills to lead resilient cybersecurity programs that adapt to threats, meet compliance demands, and strengthen organizational trust.

涵盖的内容

1个视频1次同伴评审

位教师

Paweł Mielniczek
19 门课程16,998 名学生
Starweaver
Starweaver
446 门课程818,636 名学生

提供方

Starweaver

从 Security 浏览更多内容

人们为什么选择 Coursera 来帮助自己实现职业发展

Felipe M.
自 2018开始学习的学生
''能够按照自己的速度和节奏学习课程是一次很棒的经历。只要符合自己的时间表和心情,我就可以学习。'
Jennifer J.
自 2020开始学习的学生
''我直接将从课程中学到的概念和技能应用到一个令人兴奋的新工作项目中。'
Larry W.
自 2021开始学习的学生
''如果我的大学不提供我需要的主题课程,Coursera 便是最好的去处之一。'
Chaitanya A.
''学习不仅仅是在工作中做的更好:它远不止于此。Coursera 让我无限制地学习。'
Coursera Plus

通过 Coursera Plus 开启新生涯

无限制访问 10,000+ 世界一流的课程、实践项目和就业就绪证书课程 - 所有这些都包含在您的订阅中

通过在线学位推动您的职业生涯

获取世界一流大学的学位 - 100% 在线

加入超过 3400 家选择 Coursera for Business 的全球公司

提升员工的技能,使其在数字经济中脱颖而出

常见问题

¹ 本课程的部分作业采用 AI 评分。对于这些作业,将根据 Coursera 隐私声明使用您的数据。